# Langflow 未授权远程代码执行漏洞
# 漏洞描述
## 概述
Langflow版本在1.3.0之前的版本存在代码注入漏洞。攻击者可以通过精心构造的HTTP请求,在无需身份验证的情况下,执行任意代码。
## 影响版本
- 版本:< 1.3.0
## 细节
该漏洞存在于`/api/v1/validate/code`端点中。远程且未认证的攻击者可以发送特殊构造的HTTP请求来注入并执行任意代码。
## 影响
- 远程未认证攻击
- 可以执行任意代码,进而控制服务器
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A vulnerability scanner for CVE-2025-3248 in Langflow applications. 用于扫描 Langflow 应用中 CVE-2025-3248 漏洞的工具。 | https://github.com/xuemian168/CVE-2025-3248 | POC详情 |
2 | POC of CVE-2025-3248, RCE of LangFlow | https://github.com/PuddinCat/CVE-2025-3248-POC | POC详情 |
3 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/validate/code endpoint.A remote and unauthenticated attacker can send crafted HTTP requests to execute arbitrary code. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-3248.yaml | POC详情 |
4 | None | https://github.com/verylazytech/CVE-2025-3248 | POC详情 |
5 | https://github.com/vulhub/vulhub/blob/master/langflow/CVE-2025-3248/README.md | POC详情 | |
6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%BA%BA%E5%B7%A5%E6%99%BA%E8%83%BD%E6%BC%8F%E6%B4%9E/Langflow%20code%20API%20%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-3248.md | POC详情 |
标题: fix: auth current user on code validation by jordanrfrazier · Pull Request #6911 · langflow-ai/langflow · GitHub -- 🔗来源链接
标签: patch
神龙速读标题: Unsafe at Any Speed: Abusing Python Exec for Unauth RCE in Langflow AI | Horizon3.ai -- 🔗来源链接
标签: exploit
神龙速读